Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.txt
Eran Hammer-Lahav <eran@hueniverse.com> Thu, 27 January 2011 03:23 UTC
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6098628C0F3 for <oauth@core3.amsl.com>; Wed, 26 Jan 2011 19:23:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.561
X-Spam-Level:
X-Spam-Status: No, score=-2.561 tagged_above=-999 required=5 tests=[AWL=0.038, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MxWjciZLd1XG for <oauth@core3.amsl.com>; Wed, 26 Jan 2011 19:23:54 -0800 (PST)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id C00743A6867 for <oauth@ietf.org>; Wed, 26 Jan 2011 19:23:54 -0800 (PST)
Received: (qmail 16665 invoked from network); 27 Jan 2011 03:26:57 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 27 Jan 2011 03:26:57 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Wed, 26 Jan 2011 20:26:54 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: William Mills <wmills@yahoo-inc.com>, Marius Scurtescu <mscurtescu@google.com>
Date: Wed, 26 Jan 2011 20:26:35 -0700
Thread-Topic: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.txt
Thread-Index: Acu9ogeRAwlXT0bpQq61uKkqcPiAygACe9PAAACUY8AACOWwUA==
Message-ID: <90C41DD21FB7C64BB94121FBBC2E723445A8D627C5@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <20110121004501.28103.96097.idtracker@localhost> <90C41DD21FB7C64BB94121FBBC2E723445A8D61C8E@P3PW5EX1MB01.EX1.SECURESERVER.NET> <90C41DD21FB7C64BB94121FBBC2E723445A8D61CBA@P3PW5EX1MB01.EX1.SECURESERVER.NET> <AANLkTimzOErQhT_gjdQrcawVgfsnr_2RVtTOYRoP-fcR@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E723445A8D62545@P3PW5EX1MB01.EX1.SECURESERVER.NET> <AANLkTi=doUBwOyvZx+GyJSB7N19hpQEE-UqAfQ1F-xSv@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E723445A8D6275A@P3PW5EX1MB01.EX1.SECURESERVER.NET> <FFDFD7371D517847AD71FBB08F9A31563848E7CF15@SP2-EX07VS06.ds.corp.yahoo.com>
In-Reply-To: <FFDFD7371D517847AD71FBB08F9A31563848E7CF15@SP2-EX07VS06.ds.corp.yahoo.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Jan 2011 03:23:56 -0000
This is a good example of why this is currently out of scope. We have little to no implementation experience with such a setup. EHL > -----Original Message----- > From: William Mills [mailto:wmills@yahoo-inc.com] > Sent: Wednesday, January 26, 2011 3:17 PM > To: Eran Hammer-Lahav; Marius Scurtescu > Cc: oauth@ietf.org > Subject: RE: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.txt > > Actually I was envisioning a situation where you have multiple possibly > disparate endpoints that rely on authenticator like Google or Yahoo. One > company decides they want to allow federated login and accept SAML > assertions, another accepts bearer, yet a 3rd IMAP server accepts both some > form of signed auth and bearer. I think discovery for a service should allow > the service to specify the type(s) of auth accepted and the client can choose > one that it supports and pass that on to the token server. The resource > server has to know what auth types are supported by the token server. I > would rather have this explicit in the discovery information and support > multiple types in the same SASL mechanism than have to offer N > mechanisms (or 2N if channel binding is in play). > > > -----Original Message----- > > From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf > > Of Eran Hammer-Lahav > > Sent: Wednesday, January 26, 2011 2:58 PM > > To: Marius Scurtescu > > Cc: oauth@ietf.org > > Subject: Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.txt > > > > > > > > > -----Original Message----- > > > From: Marius Scurtescu [mailto:mscurtescu@google.com] > > > Sent: Wednesday, January 26, 2011 1:43 PM > > > To: Eran Hammer-Lahav > > > Cc: oauth@ietf.org > > > Subject: Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.txt > > > > > >> 1. The token_type parameter is required in responses from the > > server. > > > >> If the server supports multiple formats, which one will be used? > > In > > > >> this case, would it make sense to allow the client to request a > > specific > > > format? > > > >> > > > >> For example, if the authorization server supports both MAC and > > > >> BEARER, which one will the server issue? > > > > > > > > It might in some cases, but I suspect most providers are going to > > decide > > > which scheme provides the right level of security for them and just > > use that. > > > If you are going to allow both MAC and BEARER, you are basically > > letting > > > clients decide which level to operate at. Do you have a need or plan > > to > > > support multiple token types? > > > > > > For now we are planning to support only bearer, but I am sure some > > form of > > > signed tokens will follow sooner than later. At which point we would > > have to > > > support both. > > > > > > In most cases I think it is up to the client to decide. > > > > Interesting. Given that you are not planning on supporting this in the > > near future, I think we should wait until there is more deployment > > experience in allowing the client to negotiate the token type. But of > > course, you are welcome to submit a proposal for inclusion on the WG > > new charter. > > > > EHL > > _______________________________________________ > > OAuth mailing list > > OAuth@ietf.org > > https://www.ietf.org/mailman/listinfo/oauth
- [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.txt Internet-Drafts
- Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.… Eran Hammer-Lahav
- Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.… Eran Hammer-Lahav
- Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.… Mike Jones
- Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.… Eran Hammer-Lahav
- Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.… Mike Jones
- Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.… Anthony Nadalin
- Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.… Marius Scurtescu
- Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.… Eran Hammer-Lahav
- Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.… Justin Richer
- Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.… Eran Hammer-Lahav
- Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.… Justin Richer
- Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.… William Mills
- Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.… Skylar Woodward
- Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.… Eran Hammer-Lahav
- Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.… Marius Scurtescu
- Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.… Marius Scurtescu
- Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.… Eran Hammer-Lahav
- Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.… Marius Scurtescu
- Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.… Eran Hammer-Lahav
- Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.… William Mills
- Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.… Eran Hammer-Lahav
- Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.… William Mills
- Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.… Richer, Justin P.